2019-02-05 10:42:30 +01:00
|
|
|
#!/bin/sh
|
2018-01-28 22:14:23 +01:00
|
|
|
# GNU Guix --- Functional package management for GNU
|
|
|
|
# Copyright © 2017 sharlatan <sharlatanus@gmail.com>
|
|
|
|
# Copyright © 2018 Ricardo Wurmus <rekado@elephly.net>
|
2018-02-21 21:09:41 +01:00
|
|
|
# Copyright © 2018 Efraim Flashner <efraim@flashner.co.il>
|
2020-05-17 14:09:43 +02:00
|
|
|
# Copyright © 2019, 2020 Tobias Geerinckx-Rice <me@tobias.gr>
|
2020-09-17 13:03:09 +02:00
|
|
|
# Copyright © 2020 Morgan Smith <Morgan.J.Smith@outlook.com>
|
2020-10-13 19:12:04 +02:00
|
|
|
# Copyright © 2020 Simon Tournier <zimon.toutoune@gmail.com>
|
2020-11-15 17:38:14 +01:00
|
|
|
# Copyright © 2020 Daniel Brooks <db48x@db48x.net>
|
2021-01-01 18:26:51 +01:00
|
|
|
# Copyright © 2021 Jakub Kądziołka <kuba@kadziolka.net>
|
2018-01-28 22:14:23 +01:00
|
|
|
#
|
|
|
|
# This file is part of GNU Guix.
|
|
|
|
#
|
|
|
|
# GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
# under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
# your option) any later version.
|
|
|
|
#
|
|
|
|
# GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
# WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
2019-02-05 10:42:30 +01:00
|
|
|
# We require Bash but for portability we'd rather not use /bin/bash or
|
|
|
|
# /usr/bin/env in the shebang, hence this hack.
|
|
|
|
if [ "x$BASH_VERSION" = "x" ]
|
|
|
|
then
|
|
|
|
exec bash "$0" "$@"
|
|
|
|
fi
|
|
|
|
|
2018-01-28 22:14:23 +01:00
|
|
|
set -e
|
|
|
|
|
|
|
|
[ "$UID" -eq 0 ] || { echo "This script must be run as root."; exit 1; }
|
|
|
|
|
|
|
|
REQUIRE=(
|
|
|
|
"dirname"
|
|
|
|
"readlink"
|
|
|
|
"wget"
|
|
|
|
"gpg"
|
|
|
|
"grep"
|
|
|
|
"which"
|
|
|
|
"sed"
|
|
|
|
"sort"
|
|
|
|
"getent"
|
|
|
|
"mktemp"
|
|
|
|
"rm"
|
|
|
|
"chmod"
|
|
|
|
"uname"
|
|
|
|
"groupadd"
|
|
|
|
"tail"
|
|
|
|
"tr"
|
2020-05-17 19:16:59 +02:00
|
|
|
"xz"
|
2018-01-28 22:14:23 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
PAS=$'[ \033[32;1mPASS\033[0m ] '
|
|
|
|
ERR=$'[ \033[31;1mFAIL\033[0m ] '
|
2020-10-13 19:12:03 +02:00
|
|
|
WAR=$'[ \033[33;1mWARN\033[0m ] '
|
2018-01-28 22:14:23 +01:00
|
|
|
INF="[ INFO ] "
|
|
|
|
|
|
|
|
DEBUG=0
|
2019-05-02 15:31:24 +02:00
|
|
|
GNU_URL="https://ftp.gnu.org/gnu/guix/"
|
2020-11-15 17:38:14 +01:00
|
|
|
#GNU_URL="https://alpha.gnu.org/gnu/guix/"
|
2018-01-28 22:14:23 +01:00
|
|
|
OPENPGP_SIGNING_KEY_ID="3CE464558A84FDC69DB40CFB090B11993D9AEBB5"
|
|
|
|
|
2018-03-25 06:47:42 +02:00
|
|
|
# This script needs to know where root's home directory is. However, we
|
|
|
|
# cannot simply use the HOME environment variable, since there is no guarantee
|
|
|
|
# that it points to root's home directory.
|
|
|
|
ROOT_HOME="$(echo ~root)"
|
|
|
|
|
2018-01-28 22:14:23 +01:00
|
|
|
# ------------------------------------------------------------------------------
|
|
|
|
#+UTILITIES
|
|
|
|
|
|
|
|
_err()
|
|
|
|
{ # All errors go to stderr.
|
|
|
|
printf "[%s]: %s\n" "$(date +%s.%3N)" "$1"
|
|
|
|
}
|
|
|
|
|
|
|
|
_msg()
|
|
|
|
{ # Default message to stdout.
|
|
|
|
printf "[%s]: %s\n" "$(date +%s.%3N)" "$1"
|
|
|
|
}
|
|
|
|
|
|
|
|
_debug()
|
|
|
|
{
|
|
|
|
if [ "${DEBUG}" = '1' ]; then
|
|
|
|
printf "[%s]: %s\n" "$(date +%s.%3N)" "$1"
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
chk_require()
|
|
|
|
{ # Check that every required command is available.
|
|
|
|
declare -a warn
|
2019-07-08 17:35:14 +02:00
|
|
|
local c
|
2018-01-28 22:14:23 +01:00
|
|
|
|
|
|
|
_debug "--- [ $FUNCNAME ] ---"
|
|
|
|
|
2019-07-08 17:32:53 +02:00
|
|
|
for c in "$@"; do
|
2018-05-18 16:51:29 +02:00
|
|
|
command -v "$c" &>/dev/null || warn+=("$c")
|
2018-01-28 22:14:23 +01:00
|
|
|
done
|
|
|
|
|
|
|
|
[ "${#warn}" -ne 0 ] &&
|
|
|
|
{ _err "${ERR}Missing commands: ${warn[*]}.";
|
|
|
|
return 1; }
|
|
|
|
|
|
|
|
_msg "${PAS}verification of required commands completed"
|
2019-07-08 18:04:30 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
chk_gpg_keyring()
|
|
|
|
{ # Check whether the Guix release signing public key is present.
|
|
|
|
_debug "--- [ $FUNCNAME ] ---"
|
2018-01-28 22:14:23 +01:00
|
|
|
|
2019-07-08 18:14:01 +02:00
|
|
|
# Without --dry-run this command will create a ~/.gnupg owned by root on
|
|
|
|
# systems where gpg has never been used, causing errors and confusion.
|
|
|
|
gpg --dry-run --list-keys ${OPENPGP_SIGNING_KEY_ID} >/dev/null 2>&1 || (
|
2018-01-28 22:14:23 +01:00
|
|
|
_err "${ERR}Missing OpenPGP public key. Fetch it with this command:"
|
2020-09-09 08:59:00 +02:00
|
|
|
echo " wget 'https://sv.gnu.org/people/viewgpg.php?user_id=15145' -qO - | sudo -i gpg --import -"
|
2018-01-28 22:14:23 +01:00
|
|
|
exit 1
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
chk_term()
|
|
|
|
{ # Check for ANSI terminal for color printing.
|
|
|
|
local ansi_term
|
|
|
|
|
|
|
|
if [ -t 2 ]; then
|
|
|
|
if [ "${TERM+set}" = 'set' ]; then
|
|
|
|
case "$TERM" in
|
|
|
|
xterm*|rxvt*|urxvt*|linux*|vt*|eterm*|screen*)
|
|
|
|
ansi_term=true
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
ansi_term=false
|
|
|
|
ERR="[ FAIL ] "
|
|
|
|
PAS="[ PASS ] "
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
chk_init_sys()
|
|
|
|
{ # Return init system type name.
|
|
|
|
if [[ $(/sbin/init --version 2>/dev/null) =~ upstart ]]; then
|
|
|
|
_msg "${INF}init system is: upstart"
|
|
|
|
INIT_SYS="upstart"
|
|
|
|
return 0
|
2020-05-17 19:17:00 +02:00
|
|
|
elif [[ $(systemctl 2>/dev/null) =~ -\.mount ]]; then
|
2018-01-28 22:14:23 +01:00
|
|
|
_msg "${INF}init system is: systemd"
|
|
|
|
INIT_SYS="systemd"
|
|
|
|
return 0
|
|
|
|
elif [[ -f /etc/init.d/cron && ! -h /etc/init.d/cron ]]; then
|
|
|
|
_msg "${INF}init system is: sysv-init"
|
|
|
|
INIT_SYS="sysv-init"
|
|
|
|
return 0
|
2020-09-17 13:03:09 +02:00
|
|
|
elif [[ $(openrc --version 2>/dev/null) =~ \(OpenRC\) ]]; then
|
|
|
|
_msg "${INF}init system is: OpenRC"
|
|
|
|
INIT_SYS="openrc"
|
|
|
|
return 0
|
2018-01-28 22:14:23 +01:00
|
|
|
else
|
|
|
|
INIT_SYS="NA"
|
|
|
|
_err "${ERR}Init system could not be detected."
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
chk_sys_arch()
|
|
|
|
{ # Check for operating system and architecture type.
|
|
|
|
local os
|
|
|
|
local arch
|
|
|
|
|
|
|
|
os="$(uname -s)"
|
|
|
|
arch="$(uname -m)"
|
|
|
|
|
|
|
|
case "$arch" in
|
|
|
|
i386 | i486 | i686 | i786 | x86)
|
|
|
|
local arch=i686
|
|
|
|
;;
|
|
|
|
x86_64 | x86-64 | x64 | amd64)
|
|
|
|
local arch=x86_64
|
|
|
|
;;
|
2018-02-21 21:09:41 +01:00
|
|
|
aarch64)
|
|
|
|
local arch=aarch64
|
|
|
|
;;
|
2020-05-31 22:42:54 +02:00
|
|
|
armv7l)
|
|
|
|
local arch=armhf
|
|
|
|
;;
|
2018-01-28 22:14:23 +01:00
|
|
|
*)
|
|
|
|
_err "${ERR}Unsupported CPU type: ${arch}"
|
|
|
|
exit 1
|
|
|
|
esac
|
|
|
|
|
|
|
|
case "$os" in
|
|
|
|
Linux | linux)
|
|
|
|
local os=linux
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
_err "${ERR}Your operation system (${os}) is not supported."
|
|
|
|
exit 1
|
|
|
|
esac
|
|
|
|
|
|
|
|
ARCH_OS="${arch}-${os}"
|
|
|
|
}
|
|
|
|
|
2020-10-13 19:12:03 +02:00
|
|
|
chk_sys_nscd()
|
|
|
|
{ # Check if nscd is up and suggest to start it or install it
|
|
|
|
if [ "$(type -P pidof)" ]; then
|
|
|
|
if [ ! "$(pidof nscd)" ]; then
|
|
|
|
_msg "${WAR}We recommend installing and/or starting your distribution 'nscd' service"
|
|
|
|
_msg "${WAR}Please read 'info guix \"Application Setup\"' about \"Name Service Switch\""
|
|
|
|
fi
|
|
|
|
else
|
|
|
|
_msg "${INF}We cannot determine if your distribution 'nscd' service is running"
|
|
|
|
_msg "${INF}Please read 'info guix \"Application Setup\"' about \"Name Service Switch\""
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2018-01-28 22:14:23 +01:00
|
|
|
# ------------------------------------------------------------------------------
|
|
|
|
#+MAIN
|
|
|
|
|
|
|
|
guix_get_bin_list()
|
|
|
|
{ # Scan GNU archive and save list of binaries
|
|
|
|
local gnu_url="$1"
|
|
|
|
local -a bin_ver_ls
|
|
|
|
local latest_ver
|
|
|
|
local default_ver
|
|
|
|
|
|
|
|
_debug "--- [ $FUNCNAME ] ---"
|
|
|
|
|
|
|
|
# Filter only version and architecture
|
|
|
|
bin_ver_ls=("$(wget -qO- "$gnu_url" \
|
2020-11-15 17:38:14 +01:00
|
|
|
| sed -n -e 's/.*guix-binary-\([0-9.]*[a-z0-9]*\)\..*.tar.xz.*/\1/p' \
|
2018-01-28 22:14:23 +01:00
|
|
|
| sort -Vu)")
|
|
|
|
|
2020-05-31 22:42:56 +02:00
|
|
|
latest_ver="$(echo "${bin_ver_ls[0]}" \
|
2020-11-15 17:38:14 +01:00
|
|
|
| grep -oE "([0-9]{1,2}\.){2}[0-9]{1,2}[a-z0-9]*" \
|
2018-01-28 22:14:23 +01:00
|
|
|
| tail -n1)"
|
|
|
|
|
|
|
|
default_ver="guix-binary-${latest_ver}.${ARCH_OS}"
|
|
|
|
|
|
|
|
if [[ "${#bin_ver_ls}" -ne "0" ]]; then
|
|
|
|
_msg "${PAS}Release for your system: ${default_ver}"
|
|
|
|
else
|
|
|
|
_err "${ERR}Could not obtain list of Guix releases."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Use default to download according to the list and local ARCH_OS.
|
2020-05-31 22:42:56 +02:00
|
|
|
BIN_VER="${default_ver}"
|
2018-01-28 22:14:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
guix_get_bin()
|
|
|
|
{ # Download and verify binary package.
|
|
|
|
local url="$1"
|
|
|
|
local bin_ver="$2"
|
|
|
|
local dl_path="$3"
|
|
|
|
|
|
|
|
_debug "--- [ $FUNCNAME ] ---"
|
|
|
|
|
|
|
|
_msg "${INF}Downloading Guix release archive"
|
|
|
|
|
|
|
|
wget --help | grep -q '\--show-progress' && \
|
|
|
|
_PROGRESS_OPT="-q --show-progress" || _PROGRESS_OPT=""
|
|
|
|
wget $_PROGRESS_OPT -P "$dl_path" "${url}/${bin_ver}.tar.xz" "${url}/${bin_ver}.tar.xz.sig"
|
|
|
|
|
|
|
|
if [[ "$?" -eq 0 ]]; then
|
|
|
|
_msg "${PAS}download completed."
|
|
|
|
else
|
|
|
|
_err "${ERR}could not download ${url}/${bin_ver}.tar.xz."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2020-05-31 22:42:57 +02:00
|
|
|
pushd "${dl_path}" >/dev/null
|
2018-01-28 22:14:23 +01:00
|
|
|
gpg --verify "${bin_ver}.tar.xz.sig" >/dev/null 2>&1
|
|
|
|
if [[ "$?" -eq 0 ]]; then
|
|
|
|
_msg "${PAS}Signature is valid."
|
|
|
|
popd >/dev/null
|
|
|
|
else
|
|
|
|
_err "${ERR}could not verify the signature."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
sys_create_store()
|
|
|
|
{ # Unpack and install /gnu/store and /var/guix
|
|
|
|
local pkg="$1"
|
|
|
|
local tmp_path="$2"
|
|
|
|
|
|
|
|
_debug "--- [ $FUNCNAME ] ---"
|
|
|
|
|
|
|
|
cd "$tmp_path"
|
2020-09-17 13:02:19 +02:00
|
|
|
tar --extract \
|
2018-01-28 22:14:23 +01:00
|
|
|
--file "$pkg" &&
|
|
|
|
_msg "${PAS}unpacked archive"
|
|
|
|
|
|
|
|
if [[ -e "/var/guix" || -e "/gnu" ]]; then
|
|
|
|
_err "${ERR}A previous Guix installation was found. Refusing to overwrite."
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
_msg "${INF}Installing /var/guix and /gnu..."
|
|
|
|
mv "${tmp_path}/var/guix" /var/
|
|
|
|
mv "${tmp_path}/gnu" /
|
|
|
|
fi
|
|
|
|
|
|
|
|
_msg "${INF}Linking the root user's profile"
|
2018-10-21 22:22:13 +02:00
|
|
|
mkdir -p "${ROOT_HOME}/.config/guix"
|
|
|
|
ln -sf /var/guix/profiles/per-user/root/current-guix \
|
|
|
|
"${ROOT_HOME}/.config/guix/current"
|
2018-01-28 22:14:23 +01:00
|
|
|
|
2018-10-21 22:22:13 +02:00
|
|
|
GUIX_PROFILE="${ROOT_HOME}/.config/guix/current"
|
2018-01-28 22:14:23 +01:00
|
|
|
source "${GUIX_PROFILE}/etc/profile"
|
2018-10-21 22:22:13 +02:00
|
|
|
_msg "${PAS}activated root profile at ${ROOT_HOME}/.config/guix/current"
|
2018-01-28 22:14:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
sys_create_build_user()
|
|
|
|
{ # Create the group and user accounts for build users.
|
|
|
|
|
|
|
|
_debug "--- [ $FUNCNAME ] ---"
|
|
|
|
|
|
|
|
if [ $(getent group guixbuild) ]; then
|
|
|
|
_msg "${INF}group guixbuild exists"
|
|
|
|
else
|
|
|
|
groupadd --system guixbuild
|
|
|
|
_msg "${PAS}group <guixbuild> created"
|
|
|
|
fi
|
|
|
|
|
|
|
|
for i in $(seq -w 1 10); do
|
|
|
|
if id "guixbuilder${i}" &>/dev/null; then
|
|
|
|
_msg "${INF}user is already in the system, reset"
|
|
|
|
usermod -g guixbuild -G guixbuild \
|
|
|
|
-d /var/empty -s "$(which nologin)" \
|
|
|
|
-c "Guix build user $i" \
|
|
|
|
"guixbuilder${i}";
|
|
|
|
else
|
|
|
|
useradd -g guixbuild -G guixbuild \
|
|
|
|
-d /var/empty -s "$(which nologin)" \
|
|
|
|
-c "Guix build user $i" --system \
|
|
|
|
"guixbuilder${i}";
|
|
|
|
_msg "${PAS}user added <guixbuilder${i}>"
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
sys_enable_guix_daemon()
|
|
|
|
{ # Run the daemon, and set it to automatically start on boot.
|
|
|
|
|
|
|
|
local info_path
|
|
|
|
local local_bin
|
|
|
|
local var_guix
|
|
|
|
|
|
|
|
_debug "--- [ $FUNCNAME ] ---"
|
|
|
|
|
|
|
|
info_path="/usr/local/share/info"
|
|
|
|
local_bin="/usr/local/bin"
|
2018-10-21 22:22:13 +02:00
|
|
|
var_guix="/var/guix/profiles/per-user/root/current-guix"
|
2018-01-28 22:14:23 +01:00
|
|
|
|
|
|
|
case "$INIT_SYS" in
|
|
|
|
upstart)
|
|
|
|
{ initctl reload-configuration;
|
2018-10-21 22:22:13 +02:00
|
|
|
cp "${ROOT_HOME}/.config/guix/current/lib/upstart/system/guix-daemon.conf" \
|
2018-01-28 22:14:23 +01:00
|
|
|
/etc/init/ &&
|
|
|
|
start guix-daemon; } &&
|
|
|
|
_msg "${PAS}enabled Guix daemon via upstart"
|
|
|
|
;;
|
|
|
|
systemd)
|
2020-05-14 15:13:12 +02:00
|
|
|
{ # systemd .mount units must be named after the target directory.
|
|
|
|
# Here we assume a hard-coded name of /gnu/store.
|
2020-05-17 14:09:43 +02:00
|
|
|
# XXX Work around <https://issues.guix.gnu.org/41356> until next release.
|
|
|
|
if [ -f "${ROOT_HOME}/.config/guix/current/lib/systemd/system/gnu-store.mount" ]; then
|
|
|
|
cp "${ROOT_HOME}/.config/guix/current/lib/systemd/system/gnu-store.mount" \
|
|
|
|
/etc/systemd/system/;
|
|
|
|
chmod 664 /etc/systemd/system/gnu-store.mount;
|
2020-07-10 13:25:26 +02:00
|
|
|
systemctl daemon-reload &&
|
|
|
|
systemctl enable gnu-store.mount;
|
2020-05-17 14:09:43 +02:00
|
|
|
fi
|
2020-05-14 15:13:12 +02:00
|
|
|
|
|
|
|
cp "${ROOT_HOME}/.config/guix/current/lib/systemd/system/guix-daemon.service" \
|
2018-01-28 22:14:23 +01:00
|
|
|
/etc/systemd/system/;
|
|
|
|
chmod 664 /etc/systemd/system/guix-daemon.service;
|
2019-09-05 18:31:03 +02:00
|
|
|
|
2020-05-31 22:42:54 +02:00
|
|
|
# Work around <https://bugs.gnu.org/36074>, present in 1.0.1.
|
|
|
|
sed -i /etc/systemd/system/guix-daemon.service \
|
|
|
|
-e "s/GUIX_LOCPATH='/'GUIX_LOCPATH=/";
|
2019-09-05 18:31:03 +02:00
|
|
|
|
2020-05-31 22:42:54 +02:00
|
|
|
# Work around <https://bugs.gnu.org/35671>, present in 1.0.1.
|
|
|
|
if ! grep en_US /etc/systemd/system/guix-daemon.service >/dev/null;
|
|
|
|
then sed -i /etc/systemd/system/guix-daemon.service \
|
|
|
|
-e 's/^Environment=\(.*\)$/Environment=\1 LC_ALL=en_US.UTF-8';
|
|
|
|
fi;
|
2019-09-05 18:31:03 +02:00
|
|
|
|
2018-01-28 22:14:23 +01:00
|
|
|
systemctl daemon-reload &&
|
2020-07-10 13:25:26 +02:00
|
|
|
systemctl enable guix-daemon &&
|
|
|
|
systemctl start guix-daemon; } &&
|
2018-01-28 22:14:23 +01:00
|
|
|
_msg "${PAS}enabled Guix daemon via systemd"
|
|
|
|
;;
|
2020-01-28 18:38:58 +01:00
|
|
|
sysv-init)
|
|
|
|
{ mkdir -p /etc/init.d;
|
|
|
|
cp "${ROOT_HOME}/.config/guix/current/etc/init.d/guix-daemon" \
|
|
|
|
/etc/init.d/guix-daemon;
|
|
|
|
chmod 775 /etc/init.d/guix-daemon;
|
|
|
|
|
|
|
|
update-rc.d guix-daemon defaults &&
|
|
|
|
update-rc.d guix-daemon enable &&
|
|
|
|
service guix-daemon start; } &&
|
|
|
|
_msg "${PAS}enabled Guix daemon via sysv"
|
|
|
|
;;
|
2020-09-17 13:03:09 +02:00
|
|
|
openrc)
|
|
|
|
{ mkdir -p /etc/init.d;
|
|
|
|
cp "${ROOT_HOME}/.config/guix/current/etc/openrc/guix-daemon" \
|
|
|
|
/etc/init.d/guix-daemon;
|
|
|
|
chmod 775 /etc/init.d/guix-daemon;
|
|
|
|
|
|
|
|
rc-update add guix-daemon default &&
|
|
|
|
rc-service guix-daemon start; } &&
|
|
|
|
_msg "${PAS}enabled Guix daemon via OpenRC"
|
|
|
|
;;
|
2018-01-28 22:14:23 +01:00
|
|
|
NA|*)
|
|
|
|
_msg "${ERR}unsupported init system; run the daemon manually:"
|
2018-10-21 22:22:13 +02:00
|
|
|
echo " ${ROOT_HOME}/.config/guix/current/bin/guix-daemon --build-users-group=guixbuild"
|
2018-01-28 22:14:23 +01:00
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
_msg "${INF}making the guix command available to other users"
|
|
|
|
|
|
|
|
[ -e "$local_bin" ] || mkdir -p "$local_bin"
|
|
|
|
ln -sf "${var_guix}/bin/guix" "$local_bin"
|
|
|
|
|
|
|
|
[ -e "$info_path" ] || mkdir -p "$info_path"
|
2020-05-31 22:42:55 +02:00
|
|
|
for i in "${var_guix}"/share/info/*; do
|
2018-01-28 22:14:23 +01:00
|
|
|
ln -sf "$i" "$info_path"
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
|
|
|
sys_authorize_build_farms()
|
2019-06-28 16:13:44 +02:00
|
|
|
{ # authorize the public key of the build farm
|
2018-01-28 22:14:23 +01:00
|
|
|
while true; do
|
2019-06-28 16:13:44 +02:00
|
|
|
read -p "Permit downloading pre-built package binaries from the project's build farm? (yes/no) " yn
|
2018-01-28 22:14:23 +01:00
|
|
|
case $yn in
|
2019-06-28 16:13:44 +02:00
|
|
|
[Yy]*) guix archive --authorize < "${ROOT_HOME}/.config/guix/current/share/guix/ci.guix.gnu.org.pub" &&
|
2019-05-10 23:37:00 +02:00
|
|
|
_msg "${PAS}Authorized public key for ci.guix.gnu.org";
|
2018-01-28 22:14:23 +01:00
|
|
|
break;;
|
|
|
|
[Nn]*) _msg "${INF}Skipped authorizing build farm public keys"
|
|
|
|
break;;
|
|
|
|
*) _msg "Please answer yes or no.";
|
|
|
|
esac
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2019-12-28 08:03:52 +01:00
|
|
|
sys_create_init_profile()
|
|
|
|
{ # Create /etc/profile.d/guix.sh for better desktop integration
|
2020-07-15 21:24:15 +02:00
|
|
|
# This will not take effect until the next shell or desktop session!
|
2020-01-21 07:49:10 +01:00
|
|
|
[ -d "/etc/profile.d" ] || mkdir /etc/profile.d # Just in case
|
2019-12-28 08:03:52 +01:00
|
|
|
cat <<"EOF" > /etc/profile.d/guix.sh
|
|
|
|
# _GUIX_PROFILE: `guix pull` profile
|
|
|
|
_GUIX_PROFILE="$HOME/.config/guix/current"
|
2021-01-01 18:26:51 +01:00
|
|
|
export PATH="$_GUIX_PROFILE/bin${PATH:+:}$PATH"
|
|
|
|
# Export INFOPATH so that the updated info pages can be found
|
|
|
|
# and read by both /usr/bin/info and/or $GUIX_PROFILE/bin/info
|
|
|
|
# When INFOPATH is unset, add a trailing colon so that Emacs
|
|
|
|
# searches 'Info-default-directory-list'.
|
|
|
|
export INFOPATH="$_GUIX_PROFILE/share/info:$INFOPATH"
|
2019-12-28 08:03:52 +01:00
|
|
|
|
|
|
|
# GUIX_PROFILE: User's default profile
|
|
|
|
GUIX_PROFILE="$HOME/.guix-profile"
|
|
|
|
[ -L $GUIX_PROFILE ] || return
|
|
|
|
GUIX_LOCPATH="$GUIX_PROFILE/lib/locale"
|
|
|
|
export GUIX_PROFILE GUIX_LOCPATH
|
|
|
|
|
2020-03-21 23:27:12 +01:00
|
|
|
[ -f "$GUIX_PROFILE/etc/profile" ] && . "$GUIX_PROFILE/etc/profile"
|
2019-12-28 08:03:52 +01:00
|
|
|
|
|
|
|
# set XDG_DATA_DIRS to include Guix installations
|
2020-01-22 00:01:33 +01:00
|
|
|
export XDG_DATA_DIRS="$GUIX_PROFILE/share:${XDG_DATA_DIRS:-/usr/local/share/:/usr/share/}"
|
2019-12-28 08:03:52 +01:00
|
|
|
EOF
|
|
|
|
}
|
|
|
|
|
2020-10-13 19:12:04 +02:00
|
|
|
sys_create_shell_completion()
|
|
|
|
{ # Symlink supported shell completions system-wide
|
|
|
|
|
|
|
|
var_guix=/var/guix/profiles/per-user/root/current-guix
|
|
|
|
bash_completion=/etc/bash_completion.d
|
|
|
|
zsh_completion=/usr/share/zsh/site-functions
|
|
|
|
fish_completion=/usr/share/fish/vendor_completions.d
|
|
|
|
|
|
|
|
{ # Just in case
|
|
|
|
for dir_shell in $bash_completion $zsh_completion $fish_completion; do
|
|
|
|
[ -d "$dir_shell" ] || mkdir -p $dir_shell
|
|
|
|
done;
|
|
|
|
|
|
|
|
ln -sf ${var_guix}/etc/bash_completion.d/* "$bash_completion";
|
|
|
|
ln -sf ${var_guix}/share/zsh/site-functions/* "$zsh_completion";
|
|
|
|
ln -sf ${var_guix}/share/fish/vendor_completions.d/* "$fish_completion"; } &&
|
|
|
|
_msg "${PAS}installed shell completion"
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-01-28 22:14:23 +01:00
|
|
|
welcome()
|
|
|
|
{
|
|
|
|
cat<<"EOF"
|
|
|
|
░░░ ░░░
|
|
|
|
░░▒▒░░░░░░░░░ ░░░░░░░░░▒▒░░
|
|
|
|
░░▒▒▒▒▒░░░░░░░ ░░░░░░░▒▒▒▒▒░
|
|
|
|
░▒▒▒░░▒▒▒▒▒ ░░░░░░░▒▒░
|
|
|
|
░▒▒▒▒░ ░░░░░░
|
|
|
|
▒▒▒▒▒ ░░░░░░
|
|
|
|
▒▒▒▒▒ ░░░░░
|
|
|
|
░▒▒▒▒▒ ░░░░░
|
|
|
|
▒▒▒▒▒ ░░░░░
|
|
|
|
▒▒▒▒▒ ░░░░░
|
|
|
|
░▒▒▒▒▒░░░░░
|
|
|
|
▒▒▒▒▒▒░░░
|
|
|
|
▒▒▒▒▒▒░
|
|
|
|
_____ _ _ _ _ _____ _
|
|
|
|
/ ____| \ | | | | | / ____| (_)
|
|
|
|
| | __| \| | | | | | | __ _ _ ___ __
|
|
|
|
| | |_ | . ' | | | | | | |_ | | | | \ \/ /
|
|
|
|
| |__| | |\ | |__| | | |__| | |_| | |> <
|
|
|
|
\_____|_| \_|\____/ \_____|\__,_|_/_/\_\
|
|
|
|
|
|
|
|
This script installs GNU Guix on your system
|
|
|
|
|
|
|
|
https://www.gnu.org/software/guix/
|
|
|
|
EOF
|
|
|
|
echo -n "Press return to continue..."
|
|
|
|
read -r ANSWER
|
|
|
|
}
|
|
|
|
|
|
|
|
main()
|
|
|
|
{
|
|
|
|
local tmp_path
|
|
|
|
welcome
|
|
|
|
|
|
|
|
_msg "Starting installation ($(date))"
|
|
|
|
|
|
|
|
chk_term
|
2019-07-08 17:32:53 +02:00
|
|
|
chk_require "${REQUIRE[@]}"
|
2019-07-08 18:04:30 +02:00
|
|
|
chk_gpg_keyring
|
2018-01-28 22:14:23 +01:00
|
|
|
chk_init_sys
|
|
|
|
chk_sys_arch
|
2020-10-13 19:12:03 +02:00
|
|
|
chk_sys_nscd
|
2018-01-28 22:14:23 +01:00
|
|
|
|
|
|
|
_msg "${INF}system is ${ARCH_OS}"
|
|
|
|
|
2019-12-04 03:42:28 +01:00
|
|
|
umask 0022
|
2018-01-28 22:14:23 +01:00
|
|
|
tmp_path="$(mktemp -t -d guix.XXX)"
|
|
|
|
|
|
|
|
guix_get_bin_list "${GNU_URL}"
|
|
|
|
guix_get_bin "${GNU_URL}" "${BIN_VER}" "$tmp_path"
|
|
|
|
|
|
|
|
sys_create_store "${BIN_VER}.tar.xz" "${tmp_path}"
|
|
|
|
sys_create_build_user
|
|
|
|
sys_enable_guix_daemon
|
|
|
|
sys_authorize_build_farms
|
2019-12-28 08:03:52 +01:00
|
|
|
sys_create_init_profile
|
2020-10-13 19:12:04 +02:00
|
|
|
sys_create_shell_completion
|
2018-01-28 22:14:23 +01:00
|
|
|
|
|
|
|
_msg "${INF}cleaning up ${tmp_path}"
|
|
|
|
rm -r "${tmp_path}"
|
|
|
|
|
|
|
|
_msg "${PAS}Guix has successfully been installed!"
|
|
|
|
_msg "${INF}Run 'info guix' to read the manual."
|
2020-07-15 21:24:15 +02:00
|
|
|
|
|
|
|
# Required to source /etc/profile in desktop environments.
|
|
|
|
_msg "${INF}Please log out and back in to complete the installation."
|
2018-01-28 22:14:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
main "$@"
|